• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • Lisbon
  • Dublin
  • Amsterdam
Edition logo

OWASP Global AppSec Dublin

2023-02-15 - 2023-02-16
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - Grant Ongers
  • Thumbnail for the video - click to play

    ►

    A Taste Of Privacy Threat Modeling
    - Kim Wuyts
  • Thumbnail for the video - click to play

    ►

    Far From Green Fields: Introducing Threat Modelling To Established Teams
    - Sarah-Jane Madden
  • Thumbnail for the video - click to play

    ►

    GitHub Actions: Vulnerabilities, Attacks, And Counter-Measures
    - Magno Logan
  • Thumbnail for the video - click to play

    ►

    Narrow – SCA Reachability Analysis Without The Effort
    - Josiah Bruner
  • Thumbnail for the video - click to play

    ►

    JavaScript Realms: The Blank Spot In Web Application Runtime Security
    - Gal Weizman
  • Thumbnail for the video - click to play

    ►

    OWASP Coraza: The Way To WAF In 2023
    - Felipe Zipitria & Juan Pablo Tosso
  • Thumbnail for the video - click to play

    ►

    Attacking And Protecting Artificial Intelligence
    - Rob Van Der Veer
  • Thumbnail for the video - click to play

    ►

    [T]OTPs Are Not As Secure As You Might Believe
    - Santiago Kantorowicz
  • Thumbnail for the video - click to play

    ►

    Ten DevSecOps Culture Failures
    - Chris Romero
  • Thumbnail for the video - click to play

    ►

    Don't Let Bug Bounty Kill Your Appsec Posture
    - Zohar Shchar
  • Thumbnail for the video - click to play

    ►

    Squeezing The Last Drop Out Of OWASP Juice Shop
    - Bjoern Kimminich
  • Thumbnail for the video - click to play

    ►

    Why Winning The War In Cybersecurity Means Winning More Of The Everyday Battles
    - Jessica Robinson
  • Thumbnail for the video - click to play

    ►

    Trusting Software: Runtime Protection Is The Third Alternative
    - Jeff Williams
  • Thumbnail for the video - click to play

    ►

    Credential Sharing As A Service: The Dark Side Of No Code
    - Michael Bargury
  • Thumbnail for the video - click to play

    ►

    Do More With Less Screen-Time: A Modern Application Security Toolchain.
    - Spyros Gasteratos
  • Thumbnail for the video - click to play

    ►

    Preventing Subdomain Takeover With OWASP Domain Protect
    - Paul Schwarzenberger
  • Thumbnail for the video - click to play

    ►

    Bootstrap And Increase Your Software Assurance With OWASP SAMM V2.1
    - Seba Deleersnyder & Bart De Win
  • Thumbnail for the video - click to play

    ►

    Passwordless Future: Using WebAuthn And Passkeys In Practice
    - Clemens Hübner
  • Thumbnail for the video - click to play

    ►

    Server Side Prototype Pollution
    - Gareth Heyes
  • Thumbnail for the video - click to play

    ►

    Empowering The Guardians Of Your Code Kingdom
    - Gabriel Manor
  • Thumbnail for the video - click to play

    ►

    Philosophizing Security In A "Mobile-First" World
    - Sergiy Yakymchuk
  • Thumbnail for the video - click to play

    ►

    Improving Supply Chain Security With OWASP Dependency Track
    - Vinod Anandan and Meha Bhargava & Niklas Jan Duster
  • Thumbnail for the video - click to play

    ►

    Shifting Security Everywhere
    - Tanya Janca
  • Thumbnail for the video - click to play

    ►

    Removing Secrets To Make Your Mobile Apps More MASVS-Secure
    - Skip Hovsmith
  • Video will not be published
    CompRCEssed : Compressed File Manipulation
    - Mehmet Önder Key
  • Thumbnail for the video - click to play

    ►

    Developer Driven Security In High-Growth Environments
    - Jakub Kaluzny
  • Thumbnail for the video - click to play

    ►

    What We've Learned From Scanning 10K+ Kubernetes Clusters
    - Ben Hirschberg
  • Thumbnail for the video - click to play

    ►

    Testability Patterns For Web Applications - A New OWASP Project
    - Dr. Luca Compagna
  • Thumbnail for the video - click to play

    ►

    Reduce Your Permissions Management Time While Effectively Protecting Your Users, It's Possible!
    - Marine Du Mesnil
  • Thumbnail for the video - click to play

    ►

    Down The Rabbit Hole: A Journey Towards A Weakness In Chrome & A New Hacking Technique
    - Gil Cohen & Omri Inbar
  • Thumbnail for the video - click to play

    ►

    How To Have Visibility And Security OF A CICD Pipeline
    - Pramod Rana
  • Thumbnail for the video - click to play

    ►

    Hacking And Defending APIs: Red And Blue Make Purple
    - Matt Tesauro
  • Thumbnail for the video - click to play

    ►

    OWASP SERVERLESS TOP 10
    - Tal Melamed
  • Thumbnail for the video - click to play

    ►

    AI-Assisted Coding: The Future Of Software Development; Between Challenges And Benefits
    - Dr. Magda Lilia Chelly
  • Thumbnail for the video - click to play

    ►

    Get On With The Program: Threat Modeling In And For Your Organization
    - Izar Tarandach
  • Thumbnail for the video - click to play

    ►

    OpenSSL Deep Dive: The Good, The Bad And The Not-So-Ugly
    - Dan Murphy & Frank Catucci
  • Thumbnail for the video - click to play

    ►

    When Is A Vulnerability Not A Vulnerability? Overcoming The Inundation Of Noisy Security Alerts
    - Adam Berman
  • Thumbnail for the video - click to play

    ►

    Log Story Short: Chopping Through Forests Of Data
    - Moti Harmats
  • Thumbnail for the video - click to play

    ►

    Automated Security Testing With OWASP Nettacker
    - Sam Stepanyan
  • Thumbnail for the video - click to play

    ►

    Not Your Parents' Cryptography: Non-traditional Encryption Problems And Solutions
    - Chuck Willis
  • Thumbnail for the video - click to play

    ►

    Constructing A Precise Dynamic Control-Flow Graph For EVM Based Smart Contracts
    - Syue Siang Su
  • Thumbnail for the video - click to play

    ►

    The Power Of DevSecOps In Web3 And Blockchain
    - Ken Toler
  • Thumbnail for the video - click to play

    ►

    Let’s Cook: Contextual Vulnerabilities Are The Ingredients And OWASP Top 10 Mapping The Seasoning
    - Meghan Jacquot
  • Thumbnail for the video - click to play

    ►

    "Mobile Wanderlust"! Our Journey To Version 2.0!
    - Sven Schleier
  • Thumbnail for the video - click to play

    ►

    Closing Ceremony
    - Matt Tesauro